Skip to content

Commit e753538

Browse files
Merge pull request #211017 from mbender-ms/avnm-concept-cross
Azure Virtual Network Manager - Cross-tenant concept article
2 parents 634c5fb + 0ba59df commit e753538

File tree

2 files changed

+65
-1
lines changed

2 files changed

+65
-1
lines changed

articles/virtual-network-manager/TOC.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,8 @@
3333
href: concept-network-groups.md
3434
- name: Azure Policy integration with network groups
3535
href: concept-azure-policy-integration.md
36-
36+
- name: Cross-tenant connection support
37+
href: concept-cross-tenant.md
3738
- name: Configuration types
3839
items:
3940
- name: Connectivity
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: 'Cross-tenant support in Azure Virtual Network Manager (Preview)'
3+
description: Learn about how cross-tenant connections are supported in Azure Virtual Network Manager.
4+
author: mbender-ms
5+
ms.author: mbender
6+
ms.service: virtual-network-manager
7+
ms.topic: conceptual
8+
ms.date: 09/12/2022
9+
ms.custom: template-concept, ignite-fall-2022
10+
---
11+
12+
13+
# Cross-tenant support in Azure Virtual Network Manager (Preview)
14+
In this article, you’ll learn about cross-tenant support in Azure Virtual Network Manager. Cross-tenant supports allows organizations to use a central Network Manager instance for managing virtual networks across different tenants and subscriptions.
15+
16+
> [!IMPORTANT]
17+
> Azure Virtual Network Manager is currently in public preview.
18+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
19+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
20+
21+
## Overview of Cross-tenant
22+
23+
Cross-tenant support in Azure Virtual Network Manager allows you to add subscriptions or management groups from other tenants to your network manager. This is done by establishing a two-way connection between the network manager and target tenants. Once connected, the central manager can deploy connectivity and/or security admin rules to virtual networks across those connected subscriptions or management groups. This support will assist organizations that fit the following scenarios:
24+
25+
- Acquisitions – In instances where organizations merge through acquisition and have multiple tenants, cross tenant support allows a central network manager to manage virtual networks across the tenants.
26+
27+
- Managed service provider – In managed service provider scenarios, an organization may manage the resources of other organizations. Cross-tenant support will allow central management of virtual networks by a central service provider for multiple clients.
28+
29+
## Cross-tenant connection
30+
31+
Establishing cross-tenant support begins with creating a cross tenant connection between two tenants. Cross-tenant support requires two-way consent--one from the network manager, the other from the target tenant's virtual network manager hub. The connections are as follows:
32+
33+
- Network manager connection - You create a cross-tenant connection from your network manager. The connection includes the exact scope of the tenant’s subscriptions or management groups to manage in your network manager.
34+
- Virtual network manager hub connection - the tenant creates a cross-tenant connection from their virtual network manager hub. This connection includes the scope of subscriptions or management groups to be managed by the central network manager.
35+
36+
Once both cross-tenant connections exist and the scopes are exactly the same, a true connection is established admins. Administrators can use their network manager to add cross-tenant resources to their NGs and to manage virtual networks included in the connection scope. Existing connectivity and/or security admin rules will be applied to the resources based on existing configurations.
37+
38+
A cross-tenant connection can only be established and maintained when both objects from each party exist. When one of the connections is removed, the cross-tenant connection is broken. If you need to delete a cross-tenant connection, you'll perform the following:
39+
40+
- Remove cross-tenant connection from the network manager side via Cross-tenant connections blade.
41+
- Remove cross-tenant connection from the tenant side via Virtual network manager hub's Cross-tenant connections blade.
42+
43+
> [!NOTE]
44+
> Once a connection is removed from either side, the network manager will no longer be able to view or manage the tenant's resources under that former connection's scope.
45+
## Required permissions
46+
47+
To use cross-tenant connection in Azure Virtual Network Manager, users need the following permissions:
48+
49+
- Administrator of central management tenant has guest account in target managed tenant.
50+
51+
- Administrator guest account has *Network Contributor* permissions applied at appropriate scope level(Management group, subscription, or virtual network).
52+
53+
Need help with setting up permissions? Check out how to [add guest users in the Azure portal](../active-directory/external-identities/b2b-quickstart-add-guest-users-portal.md), and how to [assign user roles to resources in Azure portal](../role-based-access-control/role-assignments-portal.md)
54+
55+
## Known limitations
56+
57+
Currently, cross-tenant virtual networks can only be [added to network groups manually](concept-network-groups.md#group-membership). Adding cross-tenant virtual networks to network groups dynamically through Azure Policy is a future capability.
58+
59+
## Next steps
60+
61+
- Learn how to [create a mesh network topology with Azure Virtual Network Manager using the Azure portal](how-to-create-mesh-network.md)
62+
63+
- Check out the [Azure Virtual Network Manager FAQ](faq.md)

0 commit comments

Comments
 (0)